Skip to content

Releases: antiprismca/OpenELEC-Antiprism

OpenELEC-Antiprism version 0.9.10

28 Jan 04:10
Compare
Choose a tag to compare

Changes:

  • added support for Java 8, GCC 4.8+
  • upgraded up to latest versions: i2p, i2p-bote, tor, libressl, gnupg, meek, etc.
  • fixed many bugs

OpenELEC-Antiprism version 0.9.9

28 Sep 00:17
Compare
Choose a tag to compare

Changes

  • updated versions of cryptsetup, GnuPG, tor, i2p, i2p-bote
  • added Broadcom brcmsmac driver support (now BCM4313 chip works with Wi-Fi!)
  • fixed the issue with spaces in a path on Windows
  • fixed tethering when Antiprism is inactive

OpenELEC-Antiprism version 0.9.8

26 Jun 13:27
Compare
Choose a tag to compare

OpenELEC-AntiPrism - The living room secure PC for everyone http://www.antiprism.ca/

Signature verification (of binaries)

For the signature verification the AntiPrism public key is required. You should download the public key from the Antiprism web site: http://www.antiprism.ca/pubkey.pem.

To verify the signature of the 32bit binaries use the following command:

openssl dgst -sha256 \
    -verify pubkey.pem \
    -signature OpenELEC-AntiPrism-Generic.i386-0.9.8.tar.sig \
    OpenELEC-AntiPrism-Generic.i386-0.9.8.tar

To verify the signature of the 64bit binaries use the following command:

openssl dgst -sha256 \
    -verify pubkey.pem \
    -signature OpenELEC-AntiPrism-Generic.x86_64-0.9.8.tar.sig \
    OpenELEC-AntiPrism-Generic.x86_64-0.9.8.tar

To verify the signature of the Raspberry Pi binaries use the following command:

openssl dgst -sha256 \
    -verify pubkey.pem \
    -signature OpenELEC-AntiPrism-RPi.arm-0.9.8.tar.sig \
    OpenELEC-AntiPrism-RPi.arm-0.9.8.tar

To verify the signature of the Raspberry Pi2 binaries use the following command:

openssl dgst -sha256 \
    -verify pubkey.pem \
    -signature OpenELEC-AntiPrism-RPi2.arm-0.9.8.tar.sig \
    OpenELEC-AntiPrism-RPi2.arm-0.9.8.tar

If the verification was successful you'll see the following message:
Verified OK
In case of failed verification the message should be like this:
Verification Failure

OpenSSL can be downloaded at http://www.openssl.org

Installation using USB stick (MS WIndows)

  1. Unpack downloaded binary into any folder. Make sure that the folder path doesn't contain spaces
  2. Insert your USB flash stick
  3. Run create_installstick.exe
  4. You should accept GPL licence
  5. Choose your USB drive in the dropdown menu
  6. The formatting process can take a while
  7. Insert your USB flash into the device where you are going to run Antiprism and boot it up

OpenELEC-Antiprism version 0.9.7

30 Nov 01:49
Compare
Choose a tag to compare

OpenELEC-AntiPrism - The living room secure PC for everyone http://www.antiprism.ca/

Signature verification (of binaries)

For the signature verification the AntiPrism public key is required. You should download the public key from the Antiprism web site: http://www.antiprism.ca/pubkey.pem.

To verify the signature of the 32bit binaries use the following command:

openssl dgst -sha256 \
    -verify pubkey.pem \
    -signature OpenELEC-AntiPrism-Generic.i386-0.9.7.tar.sig \
    OpenELEC-AntiPrism-Generic.i386-0.9.7.tar

To verify the signature of the 64bit binaries use the following command:

openssl dgst -sha256 \
    -verify pubkey.pem \
    -signature OpenELEC-AntiPrism-Generic.x86_64-0.9.7.tar.sig \
    OpenELEC-AntiPrism-Generic.x86_64-0.9.7.tar

If the verification was successful you'll see the following message:
Verified OK
In case of failed verification the message should be like this:
Verification Failure

OpenSSL can be downloaded at http://www.openssl.org

Hash verification (of sources)

SHA256

6c0e10b15a3bdf0547ebdb6425a1c3d860dc5a54625735668745542a6d9673db  OpenELEC-Antiprism-Antiprism-0.9.7.zip
9189497cec577dd812e0f2b2b8d1d8841de49a1e49a1394d137ad948a831af80  OpenELEC-Antiprism-Antiprism-0.9.7.tar.gz

SHA1

c22566178b68e50e026a7392e29cba977eafd169  OpenELEC-Antiprism-Antiprism-0.9.7.zip
7e66771ee39f346b9c6960858e920a2c0c8f480d  OpenELEC-Antiprism-Antiprism-0.9.7.tar.gz

To verify the hash Windows users require a tool that calculate hashes (similar to this)